Stephen Frost <sfr...@snowman.net> writes: > Further, the notion that *this* is the footgun is completely off the > reservation- if the files have been changed to allow untrusted users to > have access to them, there isn't diddly we can do about it.
I completely disagree that those file-permissions checks are useless. What they accomplish is, if you accidentally set up an insecure key file, you'll get told about it fairly promptly, and have the opportunity to either fix the permissions or generate a new key, depending on your opinion of how likely it is that somebody stole the key already. If we made no checks then, more than likely, an insecure key file would just sit there indefinitely, waiting for some passing blackhat to grab it. We can certainly discuss whether we need more than one model of what appropriate permissions are, but I do not believe that "rip out the check" is a helpful answer. regards, tom lane -- Sent via pgsql-hackers mailing list (email@example.com) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers